<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>kali linux Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/tag/kali-linux/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/tag/kali-linux/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Tue, 05 May 2020 13:47:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Hacking for beginners #1 &#8211; Install the Kali Linux</title>
		<link>https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/</link>
					<comments>https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 05 May 2020 08:33:06 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[kali linux]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1240</guid>

					<description><![CDATA[<p>In this tutorial series called Hacking for beginners, we are going to teach you how to use the most powerful open-source Linux system called Kali Linux. This tutorial gives a complete understanding of Kali Linux and explains how to use it in practice for various hacker activities. We are focusing on step-by-step guidelines with the best explanation so even beginners and hacking dummies can understand  and follow it.</p>
<p>The post <a href="https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/">Hacking for beginners #1 &#8211; Install the Kali Linux</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">In this tutorial series called <strong>Hacking for beginners</strong>, we are going to teach you how to use the most <strong>powerful open-source Linux system</strong> called <strong><a href="https://www.kali.org" target="_blank" rel="noopener noreferrer">Kali Linux</a>. </strong>This tutorial gives a <strong>complete</strong> <strong>understanding</strong> of <strong>Kali Linux</strong> and explains how to use it <strong>in practice for various hacker activities</strong>. We are focusing on step-by-step guidelines with the best explanation so even beginners and hacking dummies can understand  and follow it. Be polite, be ethical and use it only for education purposes! <strong>Enjoy and stay tuned for the next episodes <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> </strong></p>
<h3 style="text-align: justify;">What you can learn </h3>
<p style="text-align: justify;">If you want to start with hacking, first you need <strong>to have some hacking tools available</strong>. The best option for that purpose is using Kali Linux what is linux distribution specially designed to be used for hacking activities. As the part of our hacking tutorials for beginners, we are starting with the <strong>#1</strong> where you can find exact steps <strong>how to install Kali linux on MacOS using Parallels Desktop or Virtual Box</strong>. Of course, you can use <strong>any virtualization platform</strong> you want, even there is ARM Kali Linux image available for <a href="https://itblogsec.com/build-own-openvpn-server-by-using-raspberry-pi-12/" target="_blank" rel="noopener noreferrer"><strong>rapsbperry PI</strong></a>, you can download it <a href="https://www.offensive-security.com/kali-linux-arm-images/" target="_blank" rel="noopener noreferrer">here</a>. </p>
<h3 style="text-align: justify;"><strong>1: Download kali linux image</strong></h3>
<p><strong>&#8211; use official webpage https://www.kali.org/downloads/</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-13.42.16.png"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-1242" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-13.42.16.png" alt="" width="553" height="168" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-13.42.16.png 553w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-13.42.16-300x91.png 300w" sizes="(max-width: 553px) 100vw, 553px" /></a></p>
<p>&nbsp;</p>
<h3><strong>2: Import Kali linux image </strong></h3>
<p><strong>&#8211; here is example by using Parallels Desktop &#8211; choose Debian GNI/Linux (the same applicable for for Virtual Box)</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46.png"><img decoding="async" class="aligncenter size-full wp-image-1248" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46.png" alt="" width="865" height="578" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46.png 865w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46-300x200.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46-768x513.png 768w" sizes="(max-width: 865px) 100vw, 865px" /></a></p>
<h3><strong>3: Choose name and location </strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08.png"><img decoding="async" class="aligncenter size-full wp-image-1251" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08.png" alt="" width="859" height="571" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08.png 859w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08-300x199.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08-768x511.png 768w" sizes="(max-width: 859px) 100vw, 859px" /></a></p>
<h3><strong>4: Select type of installation (Graphical install)</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.19.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1252" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.19.png" alt="" width="633" height="514" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.19.png 633w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.19-300x244.png 300w" sizes="(max-width: 633px) 100vw, 633px" /></a></p>
<p>&nbsp;</p>
<h3><strong>5: Select language for installation</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1253" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53.png" alt="" width="1017" height="797" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53.png 1017w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53-768x602.png 768w" sizes="(max-width: 1017px) 100vw, 1017px" /></a></p>
<h3><strong>6: Wait for installation </strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23.png"><img loading="lazy" decoding="async" class="aligncenter wp-image-1255 size-full" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23-e1588674488352.png" alt="" width="1016" height="314" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23-e1588674488352.png 1016w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23-e1588674488352-300x93.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23-e1588674488352-768x237.png 768w" sizes="(max-width: 1016px) 100vw, 1016px" /></a></p>
<h3><strong>7: Type hostname of your Kali linux system</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1256" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17.png" alt="" width="1018" height="798" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17.png 1018w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17-768x602.png 768w" sizes="(max-width: 1018px) 100vw, 1018px" /></a></p>
<h3><strong>8: Type domain name</strong></h3>
<p><strong>&#8211; if you do not use domain, just leave it blank</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1257" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30.png" alt="" width="1019" height="795" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30.png 1019w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30-300x234.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30-768x599.png 768w" sizes="(max-width: 1019px) 100vw, 1019px" /></a></p>
<h3><strong>9: Set-up user and password </strong></h3>
<p><strong>&#8211; (always use strong password)</strong></p>
<h3><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1258" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51.png" alt="" width="1014" height="798" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51.png 1014w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51-768x604.png 768w" sizes="(max-width: 1014px) 100vw, 1014px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1259" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27.png" alt="" width="1015" height="792" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27.png 1015w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27-300x234.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27-768x599.png 768w" sizes="(max-width: 1015px) 100vw, 1015px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1260" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58.png" alt="" width="1013" height="796" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58.png 1013w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58-768x603.png 768w" sizes="(max-width: 1013px) 100vw, 1013px" /></a><strong>10: Select your time-zone</strong> </h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1261" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15.png" alt="" width="1013" height="796" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15.png 1013w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15-768x603.png 768w" sizes="(max-width: 1013px) 100vw, 1013px" /></a></p>
<h3><strong>11: Partition and format your virtual disk </strong></h3>
<p><strong>&#8211; please select: Guided &#8211; use entire disk</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1262" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57.png" alt="" width="1018" height="798" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57.png 1018w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57-768x602.png 768w" sizes="(max-width: 1018px) 100vw, 1018px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1263" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13.png" alt="" width="1017" height="799" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13.png 1017w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13-768x603.png 768w" sizes="(max-width: 1017px) 100vw, 1017px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1264" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25.png" alt="" width="1016" height="797" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25.png 1016w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25-768x602.png 768w" sizes="(max-width: 1016px) 100vw, 1016px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1265" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36.png" alt="" width="1015" height="798" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36.png 1015w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36-768x604.png 768w" sizes="(max-width: 1015px) 100vw, 1015px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1266" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56.png" alt="" width="1016" height="792" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56.png 1016w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56-300x234.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56-768x599.png 768w" sizes="(max-width: 1016px) 100vw, 1016px" /></a></p>
<h3><strong>12: Select software you want to install </strong></h3>
<p><strong>&#8211; of course later you can install any kind of software you want</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1267" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34.png" alt="" width="1015" height="800" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34.png 1015w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34-768x605.png 768w" sizes="(max-width: 1015px) 100vw, 1015px" /></a></p>
<h3><strong>13: Install GRUB boot loader</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1268" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13.png" alt="" width="1020" height="797" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13.png 1020w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13-300x234.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13-768x600.png 768w" sizes="(max-width: 1020px) 100vw, 1020px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1269" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28.png" alt="" width="1019" height="793" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28.png 1019w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28-300x233.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28-768x598.png 768w" sizes="(max-width: 1019px) 100vw, 1019px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1270" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42.png" alt="" width="1019" height="799" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42.png 1019w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42-768x602.png 768w" sizes="(max-width: 1019px) 100vw, 1019px" /></a><strong> </strong></p>
<h3><strong>14: Wait for installation to be finished</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1271" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32.png" alt="" width="1018" height="799" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32.png 1018w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32-768x603.png 768w" sizes="(max-width: 1018px) 100vw, 1018px" /></a></p>
<h3><strong>15: Congratulations! We are done.</strong></h3>
<p><strong>&#8211; Now your Kali linux system is ready to be used for your hacking practice </strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1272" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31-1024x602.png" alt="" width="1024" height="602" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31-1024x602.png 1024w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31-300x176.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31-768x452.png 768w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31.png 1275w" sizes="(max-width: 1024px) 100vw, 1024px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1273" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38-1024x603.png" alt="" width="1024" height="603" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38-1024x603.png 1024w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38-300x177.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38-768x452.png 768w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38.png 1276w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<h3>Conclusion</h3>
<p>At this point, you have the system which is ready to learn new hacking practice by yourself. In our next tutorials, we will try to bring you step-by-step guides how to learn ethical hacking practices. Stay tuned, like us on facebook and soon there will second part of <strong>Hacking for Beginners</strong> available. </p>
<p>The post <a href="https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/">Hacking for beginners #1 &#8211; Install the Kali Linux</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/242 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-12-01 03:34:30 by W3 Total Cache
-->